Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Google Blocks Site of Largest Computing Society for Being ‘harmful’

Google Blocks Site of Largest Computing Society for Being ‘harmful’

Google Search and Drive are erroneously flagging links to Association for Computing Machinery (ACM) research papers and websites as malware.

BleepingComputer has successfully reproduced the issue, first reported by researcher Maximilian Golla.

Founded in 1947 and headquartered in NYC as a non-profit, The Association for Computing Machinery (ACM) is the world’s largest scientific and educational computing society. As of 2019, ACM’s membership comprises nearly 100,000 students and professionals involved in the field of computing.

Research paper “violates” Google Drive policies

Germany-based PhD researcher, Maximilian Golla of Max Planck Society was frustrated on seeing one of his Google Docs files restricted by Google.

The file, according to Golla, contained links to ACM research papers, but “violates” Google’s Terms of Service as per a screenshot shared by the researcher:

Also Read: Best data protection practices to safeguard your organization

Researcher’s Google Docs file flagged for containing ACM links (Twitter)

And, it’s not just Google Drive. Google Search is acting funny too, Golla points out.

BleepingComputer confirmed Google Search results for the ACM website, ACM Digital Library research papers, and contact pages are also treating links to ACM domains as malicious.

Google search results flag ACM domains as malicious
Google search results flag ACM sites as malicious (BleepingComputer)

In our tests, clicking on any of the, or links appearing in the results led to an “interstitial” hosted on Google’s redirection page, warning visitors that the link might be harmful.

Also Read: Phishing scams unmasked: What really happens from planning to their aftermath

This issue is essentially blocking any and all traffic to ACM domains from Google Search results. ACM visitors will instead have to manually copy-paste the intended link in their web browser’s address bar:

Google interstitial
Google search results to ACM site blocked by an interstitial (BleepingComputer)

These warnings are typically shown by Google to visitors who may inadvertently be navigating to compromised sites or domains hosting adware, MageCart scripts, or other types of malware. Thus far, there is no indication that ACM’s domains are compromised or serving malware. BleepingComputer has reached out to ACM to ensure that is indeed the case.

“For detailed information about the problems that we found, visit Google’s Safe Browsing diagnostic page for this site,” advises Google’s warning message. But, BleepingComputer observed the “diagnostic page” indicated that ACM’s website was safe:

google diagnostic page for ACM
Google’s SafeBrowsing Diagnostic page states ACM is safe (BleepingComputer)

Third time’s a charm

Although the blocking of ACM links across Google Search and Drive seems erratic, this isn’t the first time Google Drive has erroneously flagged materials for being in violation of its Terms of Service when there is none.

In January, Google Drive was seen restricting nearly empty files for ‘copyright infringement’. These files contained no data other than some numbers or a single digit, such as ‘1’.

Google Drive documents that contain phishing links, even for personal research purposes have, on occasion, also been automatically marked to be in violation of terms and had their sharing features restricted.

BleepingComputer reached out to Google prior to publishing to understand what is causing the issue with ACM domains. While Google did not immediately disclose the cause of the problem, by Thursday evening, ACM purportedly made changes to its website resolving the issue:

“With ACM taking down the portion of their site that triggered our malware distribution warnings, this has now been resolved,” a Google spokesperson told BleepingComputer.

BleepingComputer has still not heard back from ACM.

Update, July 22, 02:43 AM ET: Added statement from Google received hours after publishing.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us